In: Computer Science
I tried ny best because there were too many question above the limit but I solved every one of them and it it was helpful please leave a like
-----------------
The difference between Windows and Linux security
vulnerabilities are complex and here
I am broking it down into simpler concepts and mentioning the
points which affect maximum users
User Privileges and Modularity
The window is not modular and if you have ever noticed whenever
one part of the computer goes bad then the whole system goes down
just like a pack of card.If all of the operating system
components get wind up together then it becomes very easy from
malware to get from the mail client to the system files.
Linux user account is not like windows accounts as in Linux user
account there is no
root access which is needed for making major changes in the system.
So if the malware gets into our system then there is no way it can
spread without root access.
Automated Functions
Most of the users don't want to spend too much time solving
technical
problems and configuring files and windows accommodate all these
functions as much
as possible for the user which gives a chance for the malware to
enter the system.
Transparency and Open-Source
Linux OS is open-source and it means that anyone can modify and
view the source code which runs the operating system
and this is the reason why there is multiple version of the Linux
operating system. Now if any vulnerability is present in
distribution or program it is very easy for developers to locate
the solution and close the vulnerability.
Though windows have open source program the operating system is
closed as a whole.
-----------------------
We have heard it so many times about new Microsoft virus or attack windows system and as per study there are around 60K viruses known for windows and just around 40-45 for Linux
Most of these viruses are not important or dangerous but many of them can cause widespread damage and we can say that Linux is more secure than windows.
Now let me tell you why we think Linux us more secure operating system
-Due to its low usage number compared to windows and if someone is targeting a software it will be more sense to target windows as one code can reach the largest segment.
-It is tough to execute a dangerous attachment in the Linux operating system.
-It does not give the user admin access by default compared to windows which have high level of user access automatically.
-Linux has more dedicated people looking out for the security issues
-----------
It creates not much of a difference now if you are Linux or window system administrator you need to do certain things like covers backup, file restores, the new system builds disaster recovery, storage management and not just that you need to cover every aspect of software and hardware management for both virtual and physical systems.
Now even if you are Linux system administrator you need knowledge of network configuration, interoperability and also window operating system along with the technical knowledge of firewalls, network security and all aspects of a working network
------------------
VPNs steady your public net connection through encrypting your records and defensive your on line pastime from cybercriminals or even your personal Internet Service Provider, or ISP. In phrases of your online privateness, the maximum steady VPNs also are probably obvious approximately their privateness policies, take steps to repair leaks, and won’t preserve logs of your surfing history.
Here’s how a web connection works with out a VPN. When you kind a internet site cope with right into a browser, your ISP faucets into your router that tool to your dwelling room with an impossible-to-don't forget password — to ahead your net visitors to that internet site. Your ISP additionally assigns a completely unique number, referred to as an Internet Protocol (IP) cope with, to the router, and every laptop or telecellsmartphone related to that router. Some web sites, advert networks, and platforms inclusive of Google
When you operate VPN software, your tool connects to the VPN provider’s servers. Your net visitors passes via the VPN’s net connection, which means your personal records is cloaked out of your ISP and web sites in order that they can’t log your net surfing. As the VPN server mixes your net visitors with others at the server, your IP cope with seems to healthy the only related to the VPN. These steps make it tougher for others to reveal and acquire records approximately wherein you move and what you do online.
------------------------
Let me give you the 5 important things that can make your VPN vulnerable to attack
-Server Problem
This problem can range from slow connection speed to the inability
of the server to connect and it can disrupt
the secure or private connection automatically.
-Unreliability of the VPN services
If the VPN service provider is not concerned about its user safety
then the use of that unreliable service
won't give them the online protection and privacy they need.
-Weak Security Protocol
VPN using weak security protocol like PPTP and if there is no way
of switching over to another
safe security protocol can put its user at risk
-Single Layer Protection and Basic Encryption System
--------------
Defense-in-depth is a records warranty method that gives multiple, redundant protective measures in case a safety manager fails or a vulnerability is exploited. It originates from a navy method via way of means of the identical name, which seeks to put off the improvement of an attack, in place of defeating it with one robust line of protection.
Defense-in-intensity cybersecurity use instances consist of end-person safety, product layout and community safety
Defense-in-intensity safety structure is primarily based totally on controls which might be designed to defend the physical, technical and administrative factors of your community.
This method builds a extra stable community via way of means of layering or even duplicating positive safety strategies to limit the opportunity of a breach. A unmarried layer of safety won’t be powerful with today’s swiftly converting and sensible cybercrime landscape. By layering a chain of various defenses, including firewalls, antivirus, intrusion detection, port scanning, stable gateways, and extra, corporations are capable of fill gaps and near loopholes that might exist if the community depended on handiest one layer of safety. As an example, if the community safety layer is compromised via way of means of a hacker, protection extensive offers directors and engineers beyond regular time to install updates and countermeasures at the same time as the antivirus and firewall layers
THANK YOU!! PLEASE VOTE